Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 04:51
Static task
static1
General
-
Target
e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe
-
Size
6.7MB
-
MD5
758b24e6726c753669dcb4f682e65d97
-
SHA1
74450ed149ed7f84d6466dbcbff9609306d38856
-
SHA256
e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f
-
SHA512
2f706dbe18f8074495282350dfdfdd6b61f42195593187df5071992375f93251a7de2b9d5e5281f0d1e94044e694956596ccd3abfbd9e2dfa746d7c8a46de4e7
-
SSDEEP
196608:LyEQzCTR+Yml/gvuBY5dsiwGmpsRYCGqHJ7f:WEgUUYmhWIYlDCkYrqHJ7
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5092-56-0x0000000000F40000-0x00000000011FA000-memory.dmp healer behavioral1/memory/5092-57-0x0000000000F40000-0x00000000011FA000-memory.dmp healer behavioral1/memory/5092-66-0x0000000000F40000-0x00000000011FA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4c633b.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4c633b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4c633b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4c633b.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4c633b.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c58q2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2M7355.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3p29Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c633b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2M7355.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c58q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3p29Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c633b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c633b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c58q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2M7355.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3p29Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1c58q2.exe -
Executes dropped EXE 9 IoCs
pid Process 4088 k5U27.exe 1984 N4w44.exe 1644 1c58q2.exe 4860 skotes.exe 1740 2M7355.exe 2376 3p29Q.exe 5092 4c633b.exe 3808 skotes.exe 5044 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1c58q2.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2M7355.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3p29Q.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4c633b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4c633b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4c633b.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" k5U27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" N4w44.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1644 1c58q2.exe 4860 skotes.exe 1740 2M7355.exe 2376 3p29Q.exe 5092 4c633b.exe 3808 skotes.exe 5044 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c58q2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4760 2376 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2M7355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3p29Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c633b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5U27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N4w44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c58q2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3p29Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3p29Q.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1644 1c58q2.exe 1644 1c58q2.exe 4860 skotes.exe 4860 skotes.exe 1740 2M7355.exe 1740 2M7355.exe 2376 3p29Q.exe 2376 3p29Q.exe 2376 3p29Q.exe 2376 3p29Q.exe 5092 4c633b.exe 5092 4c633b.exe 5092 4c633b.exe 5092 4c633b.exe 3808 skotes.exe 3808 skotes.exe 5044 skotes.exe 5044 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5092 4c633b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 1c58q2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4088 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 82 PID 4896 wrote to memory of 4088 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 82 PID 4896 wrote to memory of 4088 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 82 PID 4088 wrote to memory of 1984 4088 k5U27.exe 83 PID 4088 wrote to memory of 1984 4088 k5U27.exe 83 PID 4088 wrote to memory of 1984 4088 k5U27.exe 83 PID 1984 wrote to memory of 1644 1984 N4w44.exe 84 PID 1984 wrote to memory of 1644 1984 N4w44.exe 84 PID 1984 wrote to memory of 1644 1984 N4w44.exe 84 PID 1644 wrote to memory of 4860 1644 1c58q2.exe 85 PID 1644 wrote to memory of 4860 1644 1c58q2.exe 85 PID 1644 wrote to memory of 4860 1644 1c58q2.exe 85 PID 1984 wrote to memory of 1740 1984 N4w44.exe 86 PID 1984 wrote to memory of 1740 1984 N4w44.exe 86 PID 1984 wrote to memory of 1740 1984 N4w44.exe 86 PID 4088 wrote to memory of 2376 4088 k5U27.exe 87 PID 4088 wrote to memory of 2376 4088 k5U27.exe 87 PID 4088 wrote to memory of 2376 4088 k5U27.exe 87 PID 4896 wrote to memory of 5092 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 100 PID 4896 wrote to memory of 5092 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 100 PID 4896 wrote to memory of 5092 4896 e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe"C:\Users\Admin\AppData\Local\Temp\e06bc7fa86e6821b26b92c395682b0592e7127bc5ee9499042008d630338ce1f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k5U27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k5U27.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N4w44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N4w44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58q2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58q2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M7355.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M7355.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p29Q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p29Q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 15684⤵
- Program crash
PID:4760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c633b.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c633b.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2376 -ip 23761⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a1538bb302820a62dc8dfbebd9f7d257
SHA1d275224f7fedacacfe21323dcce3d1c02da34dd9
SHA2562b8a731cdb29b5f57fb5277feb65aedf3e0667e0db13ec3dfde27d5f45464a62
SHA512c82d8a95721674f641b5d7eaf365972b7ae2c3d475d5456f2d8fef5269ac4cb8e1a366d7a9ca934c9633c359432798011f24651b1c8fe26085e72a9e57eac259
-
Filesize
5.2MB
MD5a639c335a499c8caac498031cf7b6193
SHA116c4136d9567367300973378a5c70193ed784404
SHA2567aefc061d9a7f7785cc8f1f34686897e4d79849d887d645a60fcd9c36e367078
SHA5121a0130cd3bc2b553532b9a9739584f86430cbe4ec03ab3fcd6ace5dcf54cb111e1bcbb3c803620fa00b736896c9c29bca63bed4b5ebd678eb2e68a9cae5b54af
-
Filesize
1.7MB
MD53ecba1fe31780a2aeae80c3305137da6
SHA16ac0613e062d7cab2a03c67bdc8ebf61593606da
SHA2569cc4d94d6ed0a0793dd708dc7d9059e4257b1ebaf865ae892e2723b8c6d3b05f
SHA512b6454b42ba4f4f54c6f359817081719510aaa3ecfd9659a95a4ac61b57e703a4e4deb3546774db9fa07101455fd302f200e3938226f01018393990af5a98663c
-
Filesize
3.4MB
MD58d478eab32dd327ffdb199ba8b77a2df
SHA11d65175b25a41ee32bc441d2ac8d5fbb90cbf242
SHA256bb8714769298b5fe15a330c1f3791fdc5299b9462686f27b2eafc9c76dffb6a1
SHA512fbdba2a18251c89e89d8cc85182cb4c5bc6d540d2ca2d156aacff8a9c10acc37ea86555a9d0b514f76d7bce025948aafb46c3fa0977581b74916a52efa2b239c
-
Filesize
3.0MB
MD5d09b61439b0e63244c641f7b5a66bd21
SHA16470981ffa7dbd0650d578cc28c4cc6bb17023bc
SHA2566271fb1b8eb217d20b6cd208c77f5ea1ff244c19d9e68312edb60aaf0948f1d2
SHA512aff032d521bb88b0771e49c108280bcc4fd17f3c0f4294f7ccfb92c90ee994ed58834a5dfa5b0a9fd4b8386632b36e4b1288b90b9c413bb391197634501087bd
-
Filesize
2.9MB
MD51da44bb79437d2e290841abecca011e4
SHA137a9c77d46ed1263a54796f907fc5dfc7902b46a
SHA256ce29d2262e96d50429f3b087b7e95ec61661e4c5294e04f2373ae6f05798213b
SHA51235300e6efbbe138f7a1c2bc9ecaa4fe77bf701344d03f8612eeec14563493ab0fe027c28847d1bc54ad08300d49f7ff931e95a903e169dec8d5cc19ad7f78251